
Code Injection in Wave Term v0.12.2 allowing TCC Bypass
Discovered by
Offensive Team, Fluid Attacks
Summary
Full name
Code Injection using Electron Fuses in Wave Term v0.12.2 allowing TCC Bypasss
Code name
State
Public
Release date
Dec 12, 2025
Affected product
Waveterm
Vendor
Wave
Affected version(s)
v0.12.2
Vulnerability name
TCC Bypass
Vulnerability type
Remotely exploitable
No
CVSS v4.0 vector string
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:L/SI:L/SA:N
CVSS v4.0 base score
6.9
Exploit available
Yes
CVE ID(s)
Description
The version v0.12.2 of Wave Terminal on macOS contains a misconfiguration in the Node.js/Electron environment settings that could allow code execution by utilizing the ELECTRON_RUN_AS_NODE environment variable or the --inspect option. This allows an attacker to bypass the TCC (Transparency, Consent, and Control) safe mechanism and capture audio, video, or screen content without user consent.
Vulnerability
A misconfiguration vulnerability in Wave v0.12.2 running on macOS allows for arbitrary code execution and evasion of macOS's Transparency, Consent, and Control (TCC) mechanism. This flaw stems from the Node.js/Electron environment settings, where manipulation of the ELECTRON_RUN_AS_NODE environment variable or the use of the --inspect option can be exploited.
An attacker can leverage this misconfiguration to execute malicious code, bypassing TCC protections. This could lead to the unauthorized capture of audio from the microphone without explicit user consent, compromising system privacy.
Without the TCC bypass, an attacker can't capture audio because of the entitlements granted to the terminal.

PoC
1. Create a binary to record from the microphone.
Compile the above code with
Create the file `bypass.plist` to launch the daemon:
Launch the daemon with
Evidence of Exploitation
Executed commands
Wave term entitlements
Video of exploitation
Our security policy
We have reserved the ID CVE-2025-12843 to refer to this issue from now on.
System Information
Wave Term
Version v0.12.2
Operating System: macOS
References
Github Repository: https://github.com/wavetermdev/waveterm
Mitigation
There is currently no patch available for this vulnerability.
Credits
The vulnerability was discovered by Oscar Uribe from Fluid Attacks' Offensive Team.
Timeline
Oct 1, 2025
Vulnerability discovered
Nov 10, 2025
Vendor contacted
Nov 26, 2025
Vendor replied
Dec 12, 2025
Public disclosure
Does your application use this vulnerable software?
During our free trial, our tools assess your application, identify vulnerabilities, and provide recommendations for their remediation.





